Behavioral task
behavioral1
Sample
WR-1-2~1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
WR-1-2~1.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
loader.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
loader.exe
Resource
win10v2004-20220812-en
General
-
Target
02902aa7fed3acadf07a2e061858415f079e547812c564a698d55c6acfd828ba
-
Size
60KB
-
MD5
4c2a36bae8e5e349aecbc73a2e8354ff
-
SHA1
dbdf02de59e265604eceeb64fe70c8fc866f8f8a
-
SHA256
02902aa7fed3acadf07a2e061858415f079e547812c564a698d55c6acfd828ba
-
SHA512
8e9d1e2862ae576c889288eba511845a0388dc40fe3c9970536ab5857584ffb3b7ae0fff47970cbee16ac43cd9874c319094eb77fbb205afaa6e54185f26d3af
-
SSDEEP
1536:wLn752zVimMESWHx2JQ03fIEkW2nx8yAMhff1cnqO:Lz7MESWRV17WU8MV1cnr
Malware Config
Signatures
-
resource yara_rule static1/unpack001/WR-1-2~1.EXE upx
Files
-
02902aa7fed3acadf07a2e061858415f079e547812c564a698d55c6acfd828ba.cab
-
WR-1-2~1.EXE.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
loader.exe.exe windows x86
b499b760da624c04e700521022fd41ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
UnhandledExceptionFilter
GetCommState
InterlockedExchange
TerminateProcess
SetUnhandledExceptionFilter
Sleep
InterlockedCompareExchange
GetTickCount
IsDebuggerPresent
VerLanguageNameW
VirtualQuery
DebugBreak
IsBadStringPtrW
FindFirstChangeNotificationA
EnumSystemCodePagesW
GlobalFree
SetTapePosition
gdi32
SetBkColor
EndDoc
CreatePen
SetMapMode
SaveDC
DeleteObject
Ellipse
GetDeviceCaps
RectInRegion
GetBkColor
BitBlt
ExtTextOutW
StartPage
RestoreDC
SelectClipRgn
EndPage
GetTextMetricsW
GetStockObject
GetTextExtentPoint32W
msvcrt
strcmp
fclose
fgets
_ltow
strtoul
_stricmp
_stat
_itoa
_wfopen
strncmp
realloc
_acmdln
_controlfp
_fullpath
strspn
_waccess
wcsstr
__p__fmode
advapi32
LookupPrivilegeValueW
RegConnectRegistryW
LookupAccountSidW
AddAce
LookupPrivilegeNameW
InitializeAcl
GetSidIdentifierAuthority
IsValidSid
OpenSCManagerW
GetAce
GetTokenInformation
OpenProcessToken
MapGenericMask
QueryServiceStatus
RegOpenKeyW
RegDeleteValueW
LookupAccountNameW
FreeSid
OpenServiceW
RegSetValueExW
msvcr80
__unDNameEx
vwprintf_s
_wctomb_l
_ismbclower
_ismbcl1
_seh_longjmp_unwind
_makepath_s
__CxxRegisterExceptionObject
_mktime64
_waccess_s
_wsystem
_stricmp
_get_doserrno
_getdiskfree
_mbsspn_l
_setsystime
_osplatform
__setlc_active
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1001B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ